Huge News!Announcing our $40M Series B led by Abstract Ventures.Learn More
Socket
Sign inDemoInstall
Socket

contentful-scheduler-custom

Package Overview
Dependencies
Maintainers
1
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

contentful-scheduler-custom

  • 1.7.4
  • Rubygems
  • Socket score

Version published
Maintainers
1
Created
Source

Contentful Scheduler

Scheduling Server for Contentful entries.

Contentful

Contentful provides a content infrastructure for digital teams to power content in websites, apps, and devices. Unlike a CMS, Contentful was built to integrate with the modern software stack. It offers a central hub for structured content, powerful management and delivery APIs, and a customizable web app that enable developers and content creators to ship digital products faster.

What does contentful-scheduler do?

The aim of contentful-scheduler is to have developers setting up their Contentful entries for scheduled publishing and unpublishing.

How does it work

contentful-scheduler provides a web endpoint to receive webhook calls from Contentful.

Every time the endpoint recieves a call it looks for the value of the field defined in the configuration. If the value is a time in the future it will schedule the entry for publishing or unpublishing at the specified time.

A background worker based on the popular resque gem will then proceed to actually make the publish or unpublish call against the Content Management API at the due time. For this the Entries you wish to publish/unpublish require a customizable Date field, which we advice to call publishDate/unpublishDate, this field can be configured inside your Rakefile and is specific per-space(supports multiple spaces), also please make sure contentBlocks are valid as per logic contentBlocks are published/unpublished first then the page is published, so if there is any contentBlocks with errors those won't be published/unpublished.

You can add multiple spaces to your configuration, making it useful if you have a multi-space setup.

Requirements

  • Redis

Installation

Add this line to your application's Gemfile:

gem 'contentful-scheduler-custom'

And then execute:

$ bundle

Or install it yourself as:

$ gem install contentful-scheduler-custom

Usage

The best way to use Scheduler is as a stand-alone application that wraps Scheduler and Resque on an execution pipe using Foreman.

You can get the template for this setup in the /example directory.

If you want to roll out your own, you need to follow the next steps:

  • Create a new folder
  • Create a Gemfile with the following:
source 'https://rubygems.org'

gem 'contentful-scheduler-custom', '~>1.6'
gem 'contentful-management', '~> 1.0'
gem 'resque', '~> 1.0'
gem 'resque-scheduler', '~> 4.0'
gem 'rake'
  • Create a Procfile with the following:
web: env bundle exec rake contentful:scheduler
monitor: env bundle exec rackup
resque: env bundle exec rake resque:work
resque_scheduler: env bundle exec rake resque:scheduler
  • Create a Rakefile with the following:
require 'contentful/scheduler'

$stdout.sync = true

config = {
  logger: Logger.new(STDOUT), # Defaults to NullLogger
  port: 32123, # Defaults to 32123
  endpoint: '/scheduler', # Defaults to /scheduler
  redis: {
    host: 'YOUR_REDIS_HOST',
    port: 'YOUR_REDIS_PORT',
    password: 'YOUR_REDIS_PASSWORD'
  },
  spaces: {
    'YOUR_SPACE_ID' => {
      publish_field: 'publishDate', # It specifies the field ID for your Publish Date in your Content Type
      auth: { # This is optional
        # ... content in this section will be explained in a separate section ...
      },
      management_token: 'YOUR_TOKEN'
     },
    'YOUR_SPACE_ID' => {
      publish_field: 'publishDate', # It specifies the field ID for your Publish Date in your Content Type
      unpublish_field: 'unpublishDate', # Optional - It specifies the field ID for your Unpublish Date in your Content Type
      auth: { # This is optional
        # ... content in this section will be explained in a separate section ...
      }
      management_token: 'YOUR_TOKEN'
     },
    'YOUR_SPACE_ID' => {
      publish_field: 'publishDate', # It specifies the field ID for your Publish Date in your Content Type
      unpublish_field: 'unpublishDate', # Optional - It specifies the field ID for your Unpublish Date in your Content Type
      auth: { # This is optional
        # ... content in this section will be explained in a separate section ...
      }
      management_token: 'YOUR_TOKEN'
    }
  }
}

namespace :contentful do
  task :setup do
    Contentful::Scheduler.config = config
  end

  task :scheduler => :setup do
    Contentful::Scheduler.start
  end
end

require 'resque/tasks'
require 'resque/scheduler/tasks'

namespace :resque do
  task :setup => 'contentful:setup' do
    ENV['QUEUE'] = '*'
  end

  task :setup_schedule => :setup do
    require 'resque-scheduler'
  end

  task :scheduler => :setup_schedule
end
  • Create a config.ru with the following for the Resque monitoring server:
require 'resque'
require 'resque/server'
require 'resque/scheduler/server'

config = {
  host: 'YOUR_REDIS_HOST',
  port: 'YOUR_REDIS_PORT',
  password: 'YOUR_REDIS_PASSWORD'
}
Resque.redis = config

run Rack::URLMap.new \
  "/" => Resque::Server.new
  • Run the Application:
$ foreman start
  • Configure the webhook in Contentful:

Under the space settings menu choose webhook and add a new webhook pointing to http://YOUR_SERVER:32123/scheduler.

Keep in mind that if you modify the defaults, the URL should be changed to the values specified in the configuration.

Authentication

You may want to provide an additional layer of security to your scheduler server, therefore an additional option to add space based authentication is provided.

There are two available authentication methods. Static string matching and lambda validations, which will be explained in the next section.

Any of both mechanisms require you to add additional headers to your webhook set up, which can be done through the Contentful Web App, or through the CMA.

Authentication via static token matching

The simplest authentication mechanism, is to provide a static set of valid strings that are considered valid when found in a determined header.

For example:

config = {
  # ... the rest of the config ...
  spaces: {
    'my_space' => {
      # ... the rest of the space specific configuration ...
      auth: {
        key: 'X-Webhook-Server-Auth-Header',
        valid_tokens: ['some_valid_static_token']
      }
    }
  }
}

The above example, whenever your webhook sends the X-Webhook-Server-Auth-Header with a value of some_valid_static_token, it will accept the request and queue your webhook for processing.

You can provide multiple or a single token. If a single token is provided, it's not necessary to include it in an array.

Authentication via lambda

A more complicated solution, but far more secure, is the ability to execute a lambda as the validator function. This allows you define a function for authentication. This function can call an external authentication service, make checks against a database or do internal processing.

The function must return a truthy/falsey value in order for the authentication to be successful/unsuccessful.

For example, we validate that the token provided is either foo or bar:

config = {
  # ... the rest of the config ...
  spaces: {
    'my_space' => {
      # ... the rest of the space specific configuration ...
      auth: {
        key: 'X-Webhook-Server-Auth-Header',
        validation: -> (value) { /^(foo|bar)$/ =~ value }
      }
    }
  }
}

Or a more complicated example, checking if the header is a valid OAuth token, and then making a request to our OAuth database. For this example we'll consider you have a table called tokens and are using DataMapper as a ORM, and have a valid? method checking if the token is not expired.

config = {
  # ... the rest of the config ...
  spaces: {
    'my_space' => {
      # ... the rest of the space specific configuration ...
      auth: {
        key: 'X-Webhook-Server-Auth-Header',
        validation: proc do |value|
          return false unless /^Bearer \w+/ =~ value

          token = Token.first(token: value.gsub('Bearer ', ''))

          return false if token.nil?

          token.valid?
        end
      }
    }
  }
}

If you have multiple spaces and all share the same auth strategy, you can extract the authentication method to a variable, and assign it to all the applicable spaces in order to reduce the code duplication.

Running in Heroku

Heroku offers various Redis plugins, select the one of your liking, add the credentials into your configuration, and proceed to git heroku push master.

This will get your application set up and running. It will require 4 dynos, so a free plan isn't enough for it to run.

To run the monitor process, you'll require to run it from a different application pointing to the same Redis instance.

Make sure to change the Procfile's web process to the following:

web: PORT=$PORT bundle exec env rake contentful:scheduler

That will allow Heroku to set it's own Port according to their policy.

The URL for the webhook then will be on port 80, so you should change it to: http://YOUR_APPLICATION/scheduler.

Running in Production Mode

After verifying that application is working fine in development mode(run "foreman start" for development mode)

Run the following commands

  1. sudo foreman export -p5000 --app stp --user username_to_start_from systemd /etc/systemd/system/

Output will be like this:

[foreman export] cleaning up directory: /etc/systemd/system//graphical.target.wants [foreman export] writing: stp-web@.service [foreman export] creating: stp-web.target.wants [foreman export] symlinking: stp-web.target.wants/stp-web@5000.service -> ../stp-web@.service [foreman export] writing: stp-web.target [foreman export] writing: stp-celery@.service [foreman export] creating: stp-celery.target.wants [foreman export] symlinking: stp-celery.target.wants/stp-celery@5100.service -> ../stp-celery@.service [foreman export] writing: stp-celery.target [foreman export] writing: stp.target

  1. cat /etc/systemd/system/stp-web@.service | head -n 10

Output will be like this:

[Unit] PartOf=stp-web.target

[Service] User=username_to_start_from WorkingDirectory=/srv/stp/ Environment=PORT=%i ... HERE OTHER DIRICTIVES FROM YOUR .env file ... Environment=DEBUG=0 ...

  1. Start only gunicorn on port 5700:

    systemctl start stp-web@5700.service

  2. Start whole target:

    systemctl start stp.target

  3. Enable whole target (start on OS boot):

    systemctl enable stp.target

  4. Restarting daemon

    sudo systemctl daemon-reload

    sudo systemctl restart stp.target

  5. Optional

    You can also simply define port when call foreman export -pXXXX, but it should be multiple of 1000, e.g. 1000, 2000, 3000, 45000 etc.

Contributing

Bug reports and pull requests are welcome on GitHub at https://github.com/contentful/contentful-scheduler.rb. This project is intended to be a safe, welcoming space for collaboration, and contributors are expected to adhere to the Contributor Covenant code of conduct.

License

The gem is available as open source under the terms of the MIT License.

FAQs

Package last updated on 08 Apr 2019

Did you know?

Socket

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Install

Related posts

SocketSocket SOC 2 Logo

Product

  • Package Alerts
  • Integrations
  • Docs
  • Pricing
  • FAQ
  • Roadmap
  • Changelog

Packages

npm

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc